Cisco Cisco Email Security Appliance X1050 Guía Del Usuario
4-18
Cisco IronPort AsyncOS 7.6 for Email Daily Management Guide
OL-25138-01
Chapter 4 Quarantines
Configuring the Cisco IronPort Spam Quarantines Feature
To send a copy of a message to Cisco IronPort:
Step 1
On the Message Details page, mark the Send a Copy to IronPort Systems box:
Figure 4-12
Searching Quarantines
Step 2
Click Send. A copy of the message is sent to Cisco IronPort Systems.
Configuring the Cisco IronPort Spam Quarantines Feature
Each Cisco IronPort appliance can have a local Cisco IronPort Spam quarantine enabled if the Cisco
IronPort anti-spam has been enabled. Each Cisco IronPort appliance can also refer to an external Cisco
IronPort Spam quarantine, configured on another Cisco IronPort appliance (typically an M-Series
appliance, see “The Cisco IronPort M-Series Security Management Appliance” chapter in the Cisco
IronPort AsyncOS for Email Configuration Guidefor more information).
IronPort anti-spam has been enabled. Each Cisco IronPort appliance can also refer to an external Cisco
IronPort Spam quarantine, configured on another Cisco IronPort appliance (typically an M-Series
appliance, see “The Cisco IronPort M-Series Security Management Appliance” chapter in the Cisco
IronPort AsyncOS for Email Configuration Guidefor more information).
However, when both the local and an external Cisco IronPort Spam quarantine is enabled the local Cisco
IronPort Spam quarantine is used.
IronPort Spam quarantine is used.
Follow these steps to configure your Cisco IronPort appliance to send spam or suspect spam messages
to a Cisco IronPort Spam quarantine (local or external):
to a Cisco IronPort Spam quarantine (local or external):
Step 1
Add an external Cisco IronPort Spam quarantine (see
) or enable and configure the local Cisco IronPort Spam quarantine (see
). Configuring the local Cisco
IronPort Spam quarantine allows you to specify settings related to quarantine access, contents, and
behavior, notifications, authentication, and AsyncOS user access.
behavior, notifications, authentication, and AsyncOS user access.
Step 2
If you are configuring the local Cisco IronPort Spam quarantine, edit an IP interface and enable the Cisco
IronPort Spam quarantine HTTP or HTTPS service (see
IronPort Spam quarantine HTTP or HTTPS service (see
). Enabling the Cisco IronPort Spam quarantine HTTP/S
service allows you to access the quarantine.
Step 3
If you want to migrate from a local Cisco IronPort Spam quarantine to an external Cisco IronPort Spam
Quarantine, configure the anti-spam settings, set a shorter expiration time, and delete all of the remaining
messages in the local quarantine. (see
Quarantine, configure the anti-spam settings, set a shorter expiration time, and delete all of the remaining
messages in the local quarantine. (see
).
Step 4
Configure the anti-spam scanning options for the policy to send spam or suspect spam (or both) to the
Cisco IronPort Spam Quarantine (see
Cisco IronPort Spam Quarantine (see
). This step is where you actually configure the system to quarantine spam or suspect spam.
Step 5
See
. This important section provides a wealth of additional
guidance and information about the Cisco IronPort Spam quarantine, including notifications,
authentication, and configuration of other related AsyncOS features.
authentication, and configuration of other related AsyncOS features.